Skip to content

Commit 70d22ac

Browse files
authored
Create 12-cryptography.livemd
draft template
1 parent c92af20 commit 70d22ac

File tree

1 file changed

+115
-0
lines changed

1 file changed

+115
-0
lines changed

modules/12-cryptography.livemd

Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
# ESCT: Part 12 - Cryptography (Draft)
2+
3+
## Introduction
4+
5+
> ### 🛠 <span style="color:goldenrod;">MODULE UNDER CONSTRUCTION - Please move to next module</span>
6+
7+
8+
## Table of Contents
9+
10+
* [Past and Present](#past-and-present)
11+
* [Types and Algorithms](#types-and-algorithms)
12+
* [Implementation in Modern Applications](#implementation-in-modern-applications)
13+
* [Related Concepts](#related-concepts)
14+
* [Security Concerns](#security-concerns)
15+
16+
## Past and Present
17+
18+
### Description
19+
20+
Like many concepts/technologies in security, cryptography is not new. Centuries of devisings ways to send messages between and among
21+
known and trusted senders/receivers while making those messages unreadable for enemies or anyone else for whom the message is not intended.
22+
Secret codes, etc.
23+
24+
### <span style="color:blue;">Example</span> / <span style="color:red;">Quiz</span>
25+
26+
*TODO: Make Example or Quiz Question*
27+
28+
```elixir
29+
30+
```
31+
32+
## Types and Algorithms
33+
34+
### Description
35+
Different types depending on
36+
-how data gets chopped up to be encrypted
37+
-how many keys are involved in the encryption/decryption process
38+
-how the keys get generated/used (symmetric/asymmetric)
39+
-key size
40+
-number of cycles
41+
-for complex algorithms etc..
42+
43+
Old (Cracked - don't use)
44+
DES,etc.
45+
46+
Newer (Resilient/proven secure by industry)
47+
AES
48+
49+
50+
51+
### <span style="color:blue;">Example</span> / <span style="color:red;">Quiz</span>
52+
53+
*TODO: Make Example or Quiz Question*
54+
55+
```elixir
56+
57+
```
58+
59+
## Implementation in Modern Applications
60+
61+
### Description
62+
In-transit
63+
TLS/SSL
64+
SSH
65+
66+
At rest
67+
Algorithms above
68+
69+
Best practices for secure algorithms
70+
71+
72+
### <span style="color:blue;">Example</span> / <span style="color:red;">Quiz</span>
73+
74+
*TODO: Make Example or Quiz Question*
75+
76+
```elixir
77+
78+
```
79+
80+
## Related Concepts
81+
82+
### Description
83+
84+
Hash - Sometimes implemented alongside encryption but has a different purpose
85+
Digital Certificates - Application of cryptography/private keys
86+
Encoding - Can be confused because it is also a way to represent data that looks different from it's plaintext start
87+
88+
89+
### <span style="color:blue;">Example</span> / <span style="color:red;">Quiz</span>
90+
91+
*TODO: Make Example or Quiz Question*
92+
93+
```elixir
94+
95+
```
96+
97+
## Security Concerns
98+
99+
Key Management
100+
Hardcoding keys in code
101+
Old/Cracked protocols
102+
103+
Recommendations
104+
-Recommended algorithms
105+
-Sources for publishing notices when algorithms become cracked/obsolete and new
106+
107+
### <span style="color:blue;">Example</span> / <span style="color:red;">Quiz</span>
108+
109+
*TODO: Make Example or Quiz Question*
110+
111+
```elixir
112+
113+
```
114+
115+
[**<- Previous Module: Secure SDLC Concepts**](./3-ssdlc.livemd) || [**Next Module: Elixir Security ->**](./5-elixir.livemd)

0 commit comments

Comments
 (0)